Loading...
Sign Up for Email Updates

Course Description

The digital society has significantly impacted personal information privacy and access to information. Knowing how to effectively protect personal privacy and manage requests for information is critical. This course provides an overview of the fundamentals of privacy and access. You will examine the legislation that informs how personal information may be collected, used, shared, and accessed, as well as best practices for processing access requests, handling a privacy breach, and conducting a privacy impact assessment.

While more broadly applicable, examples from education (e.g., school boards, higher education) and municipalities are utilized. Regardless of your background, you are invited to bring your knowledge and experience to the learning environment.

Learning Outcomes

Upon successful completion of this course, you will be able to:

  • Explain the relationship between privacy, access, and records and information management
  • Accurately interpret and successfully apply the principles of privacy and access to comply with legislation and policy
  • Process access requests, apply exemptions to disclosure, and determine records eligible for disclosure
  • Comprehend and apply the components of a privacy breach protocol
  • Identify and respond to risks and implications of non-compliance with privacy and access legislation and policy
  • Recognize and incorporate privacy and access best practices
  • Recognize societal changes that impact privacy and/or access to information and be prepared to respond appropriately
  • Demonstrate leadership skills and abilities that support and advance people and work in privacy and access

Course Topics

  • Relationship between Privacy, Access, and Records and Information Management
  • Privacy and Access Legislation, Policy, and Procedures
  • Processing Access Requests
  • Records and Information Management (e.g., components of an RIM program, ethics)
  • Routine Disclosure versus Request Driven Access
  • Privacy Breach Protocol
  • Privacy and Access Risks and Implications of Non-Compliance
  • Privacy and Access Best Practices
  • Societal Changes and the Impact on Privacy and Access
  • Leading in the Field of Privacy and Access

Applies Towards the Following Certificates

Technical Requirements

You are responsible for ensuring that your computer system meets the necessary system requirements. Use the browser check tool to ensure your browser settings are compatible and up to date (results will be displayed in a new browser window).

*Course details are subject to change.

Loading...

Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrolment. Please complete a Course Inquiry so that we may promptly notify you when enrolment opens.

Required fields are indicated by .